Vulnerability Details : CVE-2022-25813
In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the "Contact us" page. Then a party manager needs to list the communications in the party component to activate the SSTI. A RCE is then possible.
Products affected by CVE-2022-25813
- cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-25813
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-25813
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-25813
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
-
The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine.Assigned by: security@apache.org (Secondary)
References for CVE-2022-25813
-
http://www.openwall.com/lists/oss-security/2022/09/02/4
oss-security - Apache OFBiz - Server-Side Template Injection (CVE-2022-25813)Mailing List;Patch;Third Party Advisory
-
https://lists.apache.org/thread/vmj5s0qb59t0lvzf3vol3z1sc3sgyb2b
Subject: Apache OFBiz - Server-Side Template Injection (CVE-2022-25813)-Apache Mail ArchivesMailing List;Patch;Vendor Advisory
Jump to